Sun Secure Global Desktop Software 4.2 Installation Guide

Read this page to find out how to install Sun Secure Global Desktop Software version 4.2 on your system.

This page uses the term "host" to mean the UNIX/Linux system on which you want to install Sun Secure Global Desktop Software.

Contents

  1. Before you install
  2. Installing Sun Secure Global Desktop Software
  3. Upgrading Secure Global Desktop
  4. Getting started
  5. Bug fixes in the 4.20.959 release
  6. Bug fixes in the 4.20.983 release

Before you install

Supported operating systems

Version 4.2 is supported on the following operating systems:

Operating system Supported versions
Solaris™ Operating System (Solaris OS) on SPARC® platforms 8 9 10
Solaris OS on x86 platforms     10
Red Hat Enterprise Linux (x86) 3 4  
Fedora Linux (x86) Core 3 Core 4  
SUSE Linux Enterprise Server (x86) 8 9  

Operating system modifications

You must make the following operating system modifications to the host before you install Secure Global Desktop. Without these modifications the software may not install properly.

The Secure Global Desktop Administration Guide has details of other operating system modifications you may need to make after you have installed, see http://server.example.com/tarantella/help/en-us/base/gettingstarted/recommended_os_mods.html.

Fedora Core 3 and Core 4

Secure Global Desktop will not install if the libXp.so.6 library is not available on the host. This library was deprecated in Fedora Core 3. However the library is still available in the xorg-x11-deprecated-libs-6.8.1-12.i386.rpm package.

The Mainframe and AS/400 Connectivity Packs will not install if the libXm.so.3 library is not available on the host. This library is available in the openmotif-2.2.3-10.i386-10.i386.rpm package.

SUSE Linux Enterprise Server 9 with Service Pack 2

Secure Global Desktop will not install if the libgdbm.so.2 library is not available on the host. SUSE Linux Enterprise Server 9 with Service Pack 2 contains version 3 of the library by default. You must obtain and install version 2 of the library before installing Secure Global Desktop. When you install Secure Global Desktop, use the --nodeps option with the rpm command.

Solaris 8+ OS on SPARC platforms

Secure Global Desktop requires the /usr/lib/libsendfile.so library. If this library is missing, Secure Global Desktop will not install. This library may be included with your SUNWcsl (Core Solaris Libraries) package or you may have to apply patch 111297-01 (available from the SunSolve Patch Support Portal ) to get it.

Solaris OS comes in the following distributions: Core, End User, Development and Entire Distribution. You must install at least the End User distribution to get the necessary libraries required by Secure Global Desktop. If you do not, Secure Global Desktop will not install.

Configure your network

You must configure you network for use with Secure Global Desktop:

The Secure Global Desktop Administration Guide has information about:

The Secure Global Desktop Web Server

A web server is an essential part of a working Secure Global Desktop installation. The Secure Global Desktop Base Component includes the Secure Global Desktop Web Server, which is pre-configured for use with Secure Global Desktop.

When you install Secure Global Desktop Base Component, you will be prompted for the TCP port on which the Secure Global Desktop Web Server listens for HTTP connections. This is usually port 80/tcp, but if another process is listening on that port you will be prompted to choose another.

The Secure Global Desktop Administration Guide has information about:

The ttaserv and ttasys users

There must be a ttaserv and ttasys user on the host before you can install Secure Global Desktop. There must also be a ttaserv group.

The ttasys user owns all the files and processes used by the Secure Global Desktop server. The ttaserv user owns all the files and processes used by the Secure Global Desktop Web Server.

The Secure Global Desktop server does not require the privileges of the UNIX root user to run. The server starts as root and then downgrades to the ttasys user.

If you try to install the software without these users and group in place, the installation will stop without making any changes to the system and tell you what you need to do. The requirements are:

One way to create these users is with the useradd and groupadd commands, for example:

groupadd ttaserv
useradd -g ttaserv -s /bin/sh ttaserv
passwd -l ttaserv

Installing Sun Secure Global Desktop Software

Sun Secure Global Desktop Software contains several installable components. Some components are installed on:

The following table shows the packs that you can install on hosts, their package name and what they provide:

Pack Package Description
Secure Global Desktop
Base Component
tta
  • Contains the core functionality of Secure Global Desktop.
  • Allows you to give users access to UNIX and/or Windows applications
  • You must install this package first.
Secure Global Desktop
Security Pack
ttasecure
  • Allows you to secure connections between client devices and Secure Global Desktop servers.
  • This package is optional.
AS/400 Connectivity Pack tta5250
  • Allows you to give users access to AS/400 (5250) applications.
  • This package is optional.
Mainframe Connectivity Pack tta3270
  • Allows you to give users access to mainframe (3270) applications.
  • This package is optional.
Additional fonts ttafandr (Andrew X fonts)
ttafhang (Hangul X fonts)
ttaficl  (ICL X fonts)
ttaforie (Oriental X fonts)
ttafscot (SCO Term X fonts)
  • Allows you to support applications that require additional fonts.
  • These packages are optional.
  • Only install some or all of these fonts if you have applications that require them.

Installing Secure Global Desktop packs on Solaris OS platforms

On Solaris OS platforms, you install the packs with the pkgadd command.

If the installation files for the packs are compressed, you need to expand them before installing.

If you are upgrading, read the upgrade instructions before installing the software.

By default, the software is installed in /opt/tarantella, but the installation program, Secure Global Desktop Setup, will prompt you for the installation directory when you install the Secure Global Desktop Base Component. All the optional packs are installed in the same directory as the Base Component.

  1. Log in as root.
  2. Install the Base Component, for example:
    pkgadd -d /full_path/ttaarch.pkg
    where arch is i3so for Solaris OS on x86 platforms and spso for Solaris OS on SPARC platforms.

    When you install the Base Component, Setup:

    If the installation fails with a pwd: cannot determine current directory! error message, change to the /tmp directory and try again.

    When Setup has finished installing the Base Component, the Secure Global Desktop server and the Secure Global Desktop Web Server will be running.

  3. Install the optional packs.

Installing Secure Global Desktop packs on Linux platforms

On Linux, you install the packs with the rpm command.

If you are upgrading, read the upgrade instructions before installing the software.

By default, the software is installed in /opt/tarantella, but you can choose a different installation directory by using the --prefix option when you install the secure Global Desktop Base Component. If you install the packs separately, you must use the --prefix each time you install a pack.

  1. Log in as root.
  2. Install the Base Component and any optional packs you require, for example:
    rpm -Uvh tta-version.i386.rpm ttasecure-version.i386.rpm ...

    If you are creating an array of Secure Global Desktop servers, you must install the same set of optional packs on each server.

  3. Start the Secure Global Desktop server by running the following command:
    /opt/tarantella/bin/tarantella start

    When you start the Secure Global server for the first time, the installation program, Secure Global Desktop Setup, automatically starts. Setup:

    When Setup has finished, the Secure Global Desktop server and the Secure Global Desktop Web Server will be running.

Installing the Secure Global Desktop Enhancement Module for Windows

The Sun Secure Global Desktop Enhancement Module for Windows provides a client drive mapping service, an application server load balancing service and support for seamless windows. It is supported on Microsoft Windows 2000 Server and Microsoft Windows Server 2003.

  1. Log in to the Windows 2000/2003 server as a user with administrator privileges.
  2. Save the temwin32.exe program to a temporary directory on the Windows 2000/2003 application server.

    If you are not installing from the CD, you can download the file from a Secure Global Desktop server from:
    http://server.example.com

  3. Double-click temwin32.exe to install the Enhancement Module.
  4. Follow the instructions on your screen.

Note You can select which components of the Enhancement Module to install or install all components.

Installing the Secure Global Desktop Enhancement Module for UNIX

The Sun Secure Global Desktop Enhancement Module for UNIX provides an application server load balancing service. It is supported on the same versions of Solaris OS as Secure Global Desktop.

You install the Enhancement Module with the pkgadd command.

If the installation file for the Enhancement Module is compressed, you need to expand it before installing.

By default, the Enhancement Module is installed in /opt/tta_tem, but the installation program will prompt you for the installation directory.

  1. Log in as root on the application server.
  2. Save the Enhancement Module installation program to a temporary directory on the application server.

    If you are not installing from the CD, you can download the file from a Secure Global Desktop server from:
    http://server.example.com

  3. Install the Enhancement Module, for example:
    pkgadd -d /full_path/temarch.pkg
    where arch is i3so for Solaris OS on x86 platforms and spso for Solaris OS on SPARC platforms.
  4. Follow the instructions on your screen.

Installing the Secure Global Desktop Enhancement Module for Linux

The Sun Secure Global Desktop Enhancement Module for Linux provides an application server load balancing service. It is supported on the same versions of Linux as Secure Global Desktop.

You install the Enhancement Module with the rpm command.

By default, the Enhancement Module is installed in /opt/tta_tem, but you can choose a different the installation directory by using the --prefix option when you install.

  1. Log in as root on the application server.
  2. Save the Enhancement Module installation program to a temporary directory on the application server.

    If you are not installing from the CD, you can download the file from a Secure Global Desktop server from:
    http://server.example.com

  3. Install the Enhancement Module, for example:
    rpm -Uvh temversion.i386.rpm

Installing the Native Client for Microsoft Windows

  1. Copy the Client Setup program, tncwin32.exe, to a temporary directory on your PC.

    If you are not installing from the CD, you can download the program from a Secure Global Desktop server from:
    http://server.example.com

  2. Browse to the temporary directory and double-click tncwin32.exe.
  3. Follow the instructions on your screen.

Installing the Native Client for UNIX/Linux

  1. Copy the Client tar file to a temporary directory on your system.

    If you are not installing from the CD, you can download the file from a Secure Global Desktop server from:
    http://server.example.com

    The file is:

  2. At a command prompt, extract the tar file by typing tar xvf <tar file> .
  3. Install the Native Client by typing sh ttwebtop/install.

Installing the Native Client for Mac OS X

  1. Copy the Client disk image file, tncppdw.dmg, to a temporary directory on your Macintosh.

    If you are not installing from the CD, you can download the file from a Secure Global Desktop server from:
    http://server.example.com

  2. Open (mount) the disk image.
  3. Drag the Secure Global Desktop Client application to your desktop or hard drive.

Upgrading Secure Global Desktop

If you are upgrading from a previous release of Secure Global Desktop, your current configuration is usually preserved when you upgrade. This section tells you what you need to know about upgrading.

Note the directory paths listed in this section assume the software is installed in the default /opt/tarantella directory.

Upgrading and Early Access Program (EAP) software

Upgrades to or upgrades from EAP releases of Secure Global Desktop software are not supported. EAP releases must always be "clean" installs.

Upgrading an evaluation version of Secure Global Desktop

If a Secure Global Desktop server is in evaluation mode or expired evaluation mode, you can upgrade it by installing the next version of Secure Global Desktop.

A server that was in expired evaluation mode remains in expired evaluation mode after the upgrade. You cannot log in to a Secure Global Desktop server when it is in expired evaluation mode. To license a server when it is in expired evaluation mode, you must either add a valid Activation license key (using the tarantella license add command) or join the server to an array that is already fully licensed.

Conditions for upgrading to version 4.2

You can only upgrade to Secure Global Desktop version 4.2 if:

If you want to upgrade from Enterprise 3 version 3.3 or earlier, contact Support for details of how to upgrade.

A valid maintenance subscription means you have installed sufficient maintenance keys for your product keys before trying to upgrade.

If you have bought the right to upgrade, you must install the Right to upgrade key before trying to upgrade.

Changes to licensing

Version 4.2 contains the following changes to licensing:

When you upgrade:

After you have upgraded, use the tarantella license list command to list your new license keys. Make a note of them and keep them somewhere safe.

Before you upgrade on Solaris OS platforms

Before you upgrade on Solaris OS platforms, you are strongly advised to create an installation administration file (for example, /tmp/pkgadmin) with the following contents:
conflict=nocheck

When you install the packs, use the -a admin option to specify the administration file, for example:
pkgadd -a /tmp/pkgadmin -d /full_path/ttaarch.pkg

This avoids a lot of undesirable user interaction. Consult your system documentation for pkgadd to see what other administration options are available.

Before you upgrade from 4.2 on Linux platforms

On Linux platforms, if you are upgrading from a previous version of 4.2, you must manually uninstall all optional packs before upgrading.

To list all the packs that have been installed, run the following command:
rpm -qa | grep -i tta

To remove all optional packs, run the following command:
rpm -e pack ...
for example rpm -e ttasecure tta3270 removes the Security Pack and the Mainframe Connectivity Pack.

Upgrading a fully licensed single-server array

To upgrade a fully licensed array containing a single server:

  1. Make sure there are no webtop and emulator sessions running in the array, including suspended sessions.
  2. Stop the Secure Global Desktop server, using tarantella stop.
  3. Stop the Secure Global Desktop Web Server, using tarantella webserver stop.
  4. Upgrade the server by installing Secure Global Desktop.
  5. Use the tarantella license list command to list your new license keys. Make a note of them and keep them somewhere safe.

Upgrading a fully licensed multiple-server array

As Secure Global Desktop servers in an array share configuration information, all servers in an array must run on the same major/patch (4.2x) version of Secure Global Desktop. This means that to upgrade a multiple-server array, you must dismantle the array and upgrade each server independently.

To upgrade a fully licensed array containing multiple servers:

  1. Make sure there are no webtop and emulator sessions running in the array, including suspended sessions.
  2. Stop all Secure Global Desktop servers. Stop the secondaries first and then the primary.
  3. Dismantle the array.
  4. Upgrade the primary server. Follow the steps for a single-server array above.
  5. Upgrade the secondary servers by installing Secure Global Desktop. The same optional packs must be installed on all array members.
  6. Rebuild the array.

Upgrading the Secure Global Desktop Web Server

When upgrade you also upgrade the Secure Global Desktop Web Server. If you customized any of the files in the Apache/Tomcat directories these will be preserved when you upgrade.

If you upgrade from version 4.0 or earlier, the files will be preserved:

If you upgrade from version 4.1 or later, the files will be preserved in their existing directory but renamed with a 4.20.909 suffix. For example, if you made changes to the Apache httpd.conf file, these changes will be preserved in the same directory in a file called httpd.4.20.909.

You have to manually copy your customizations to the new Apache/Tomcat directories.

Upgrading Secure Global Desktop clients

All web browser users must restart their web browsers before connecting to an upgraded Secure Global Desktop server.

If you are using your own web server instead of the Secure Global Desktop Web Server, you must restart your web server to ensure that users receive upgraded Java archives.

We recommend that Native Client users download and install the latest version of the Client from http://server.example.com .

Version 4.0/4.1 versions and 4.2 versions of the Native Client for Windows are installed in different locations to previous versions. This means that the 3.x versions and 4.0/4.1 versions are not uninstalled when you upgrade and will remain on the Windows Start menu. You may need to keep the previous versions to connect to Secure Global Desktop servers running older version of the software or they can be manually uninstalled.

The changes Secure Global Desktop makes during the upgrade

A complete copy of your ENS database (this is the storage area for all the objects in your Secure Global Desktop organizational hierarchy) is taken from the var/ens directory and backed up to the var/ens.<oldversionnumber> directory. The backup is not changed and the existing ENS database is only changed if new objects essential to the running of Secure Global Desktop are needed.

The local/global array configuration stored in the var/serverconfig directory is only changed if there is a need to insert any new properties files and add new attributes to existing properties. This directory is not backed up.

All the server resources files in the var/serverresources directory are replaced. These files are not normally edited as they control how Secure Global Desktop works.

The Secure Global Desktop login scripts contained in the var/serverresources/expect directory is backed up to var/serverresources/expect.<oldversionnumber> .

If you have customized Secure Global Desktop by changing the files found in a standard installation (for example, webtop themes) or by adding your own files (for example, Expect scripts), these are not upgraded. You may have to upgrade these files manually. When you install the new version of Secure Global Desktop, Setup warns you if there are files which may need to be upgraded manually and displays a list of log files to help you identify them. See "Upgrading a customized Secure Global Desktop installation" in the Secure Global Desktop Administration Guide (http://server.example.com/tarantella/help/en-us/base/gettingstarted/upgrading_tarantella.html) for advice on how to upgrade these files.

Change to mainframe (3270) applications

From version 4.0, Secure Global Desktop uses a different emulator for mainframe (3270) applications. 3270 character and 3270 X application objects are no longer available and have been replaced by a single 3270 application object. As the new 3270 application object has several new attributes, it is not possible to upgrade existing 3270 application objects. If you upgrade from version 3.x, your existing 3270 character and 3270 X applications will be deleted when you upgrade and you will need to re-configure them.

Change to application connection methods

From version 4.1, Secure Global Desktop no longer supports the rlogin and rcmd connection methods for starting applications. After upgrading you must change the connection method for any applications that use these methods.

Change to simultaneous webtop connections attribute

From version 4.1, Secure Global Desktop uses a different attribute for the Maximum simultaneous webtop connections setting (--tuning-maxconnections). After upgrading, the default setting for this attribute will be applied.

Getting started with Secure Global Desktop

To get started with Secure Global Desktop:

  1. Using a web browser, go to the following URL:
    http://server.example.com
  2. Select either:
  3. When the Secure Global Desktop login page displays, log in using the username "Administrator" and the password of the UNIX/Linux root user. The login page may take a few minutes to display the first time you visit it.
  4. When you have logged in, the webtop displays. The webtop lists the applications you can run and documents you can see.

When you first log in, your webtop will list:

Secure Global Desktop supports several mechanisms for authenticating users. By default, any user with an account on the host can log in to Secure Global Desktop using their UNIX/Linux username and password.

Bug fixes in the 4.20.959 release

Bug reference Description
606577 Invalid Terminal Service License error with Windows 2000 client connecting to Windows 2000 Terminal Server.
606669 Try running from client first feature does not work with Java technology Client.
606918 Independent windows resume too small and do not resize.
606920 Datastore corruption.
606933 Secure Global Desktop Client does not work properly with dual monitor SunRay.
607020 Can not launch X applications after a SunRay server reboot.
607038 Installation directory sanity check feedback needs filtering.
607048 After 4.20 we should stop building SHX files.
607051 Uninstalling the Secure Global Desktop Enhancement Module using the rpm --e tem command does not stop the load balancing service (ttaloadprobe).
607054 When installing the Security Pack, the pkgadd command reports that the Base Component is not installed even though it is.
607070 Printing does not work on a freshly installed Fedora Core 4.
607095 After upgrading from 3.42.903 to 4.20.907, unable to activate LDAP or Active Directory login authorities.
607096 Installing with the rpm command leaves the en-us_setup file in /.
607101 Native Client for Windows-based Terminals issues: SSL is broken.
607101 Native Client for Windows-based Terminals issues: initial connection box is broken.
607101 Native Client for Windows-based Terminals issues: can not launch applications in a seamless window.
607104 Hierarchy.jsp allows user to exceed value set for Max Instances. Launch fails with ugly error message.
607106 The setTCCConfiguration method is missing from the web services WSDL file.
607122 Session disconnects after renewing an expired password.
607123 Changing an Active Directory password on expiry does not work.
607125 Expired Thawte certificates are not handled properly by some web browsers.
607130 Java 2 Platform Standard Edition 5.0 Runtime Environment (JRE) crashes on the primary server in the array.
607131 Application display is clipped when using the Secure Global Desktop Client and a client window management window.
607176 Password caching broken in 4.2.
607180 Bandwidth settings are not honored for default login profile objects.
607182 Authentication fails on the secondary servers in the array.
607205 When using secure LDAP (LDAPS) connections, the Change Password dialog box is strange.
607208 UNIX-based login authorities do not detect an updated NIS password.
607218 Smart card authentication fails with ActivCard - Cyberflex 64k.
607228 Pasting from a Windows client to an X application accessed through Secure Global Desktop fails.
607229 UTF-8 text in does not display on the webtop.
607231 Active Directory fixes.
6368760 Secure Global Desktop Native Client for UNIX running under a CAM script does not exit under all circumstances.
6376221 Remote Desktop Protocol (RDP) printer properties (such as paper size) do not appear to be stored between sessions (Note: this is not fixed on Solaris OS on SPARC platforms).
6379737 Opening a Microsoft Excel file causes a session to terminate.
6387953 Secure Global Desktop Web Server components fail to start after installation (Solaris OS x86 platforms only).
6391125 Cadence 5 application performance suffers when displayed through Secure Global Desktop.
6391573 Secure Global Desktop Native Client crashes when loading the webtop on a WYSE S30 (WinCE5.0) device.
6391590 Secure Global Desktop Native Client's application server authentication dialog is only partially filled.
6392597 Classic webtop does not automatically detect proxy configuration with JRE 1.5.
6395531 When using the xgerman keymap, the ' (shift and then # on a German keyboard) returns the acute symbol.
6396181 Minor changes for compatibility with WYSE S30 devices.
6400159 Escaping acute key does not work with locales that use xgerman.txt keymap.
6405415 Classroom shadowing (teacher) launch fails because the TTABASEDATADIR variable is missing.
6407372 Version 4.2 array failure.
6408972 Script to start the Secure Global Desktop Enhancement Module produces errors due to missing postinstall script.
6409117 Secure Global Desktop Enhancement Module fails on Solaris OS on x86 platforms.
6411734 Secure Global Desktop Native Clients can not resume applications configured to use independent windows.
6416375 Secure Global Desktop Client core dumps on Solaris OS on SPARC platforms.

Bug fixes in the 4.20.983 release

The 4.20.983 release contains all the bug fixes in the 4.20.959 release and the following additional fixes:

Bug reference Description
6407372 Array instability caused by JVM crash (also see 607130).
6422254 Default RDP printer not set to the same as the client.
6423269 RDP sessions occasionally end unexpectedly.
6426197 Scrolling in Microsoft Word document causes RDP session to end.
6427852 Login delay caused by inaccessible client network printers.
6433229 Konica Minolta printer driver causes RDP session to end.
6435527 Segmentation fault in ttaxpe when running Hewlett Packard monitoring tool.
6442142 Exiting Gnome session causes the ttaxpe to spin and utilize 100% CPU.
6452763 Maximum application session instance count not decremented on application exit when using Intelligent Array Routing.
6455445 Invalid SSGD user credentials allow access to the Webtop when logging in with the browser and Native Client simultaneously.
6465337 Certificates used to sign 4.20 archives expired in August 2006.
6465658 Updated NIS password not detected by UNIX login authority.
6466059 /etc/pam.d/tarantella file not created when installing on Linux.
6467099 SSGD security vulnerability fixes.